3.8 Port Check Lab Part 2 EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
I welcome back to the course. In the last video, we got logged into our cyber ladder lab environment. We also launched the Cali machine through Vienna.
So in this video, we're just gonna type in a simple and map command to check for any open ports.
So in step number 12 here, we're gonna type n map space Dash. Excuse me. Space 1 92.168 So N map 1 92 16801
Let's go ahead and type that in now. So N map all over. Case
a space and then 1 92.168 dot 0.1 and then we're just gonna hit the enter key. We're gonna let that run for a moment or so.
So basically what we're doing with this generic and map command here that's gonna basically perform a default since can So if you remember from our lecture on TCP header flags And also when we talked about the TCP through a handshake, we talked about sin packets.
So what? This default scan does his scans 1000 generalized TCP ports at the target I p address, so it may not push back 1000 results, but it's gonna scan kind of 1000 of the most common ports.
So we see Attorney down here. Let's look at our screen.
We see several different ports open here,
and it also tells us a brief description of what it is. So Camaros, different things here.
And then we also have some unknown one. So that might tell us that maybe that support we can use for something, you know, we can get some more information on that port and use that as an entry point and to their particular network.
We can also see what types of other things that might be running, you know, like if they're using L dap or something like that. So if these ports are open, these may be potential things that we can use to exploit.
So let's look back on our lab document here. So question one. Was there any response? Yes, we do see that there was a response and that we see all these different parts are open.
So in this video, which is kind of a high level overview of running an end map command and again we want to see if there was any open ports on our target machine.
The next video were to do the same. A similar thing with age Ping three were to look for any open ports on the machine.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By